Analysis

  • max time kernel
    147s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2023 13:14

General

  • Target

    Request For Quotation.exe

  • Size

    520KB

  • MD5

    ac92da6c3c72d2ffd2bcfd2069e2a5ec

  • SHA1

    c0fe0ad6c500e8c147c538491d92f790f4b7852a

  • SHA256

    e0042984cd831b02a7c2b7cb18915c2198302406aabe5c1c3d2decf7c6b252e1

  • SHA512

    0cd6151ce7a17da1843115d8607bc9e0b8102b6a0fda49ba7721d0c3b8a37263096a19a75c774b49bf88d56e391de56893b05bbd501b1424c590de1a2627ded2

  • SSDEEP

    12288:vY7tZQcyX/AYo2cYQxWXn4L0WXOs5R0TybkSffYp99Z4NY4hMg+:vY7t+VXBtQghq7JfYpB4K4hMX

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\crvkmc.exe
      "C:\Users\Admin\AppData\Local\Temp\crvkmc.exe" C:\Users\Admin\AppData\Local\Temp\zuelngxpgz.mts
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Users\Admin\AppData\Local\Temp\crvkmc.exe
        "C:\Users\Admin\AppData\Local\Temp\crvkmc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:4144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\crvkmc.exe

    Filesize

    91KB

    MD5

    fa3f85e115ed69c2d518d5deaa790216

    SHA1

    ab409d96d10f11df4b1093df159eff0c29aba6cd

    SHA256

    5698598964222a80225a459bd1cc353d0c3d9ecc9689a547e4d180518c454c1e

    SHA512

    2cb74cf3f9a3527a081b1de470261c8b273f4357aa708bc446618aeddc55273bf2f1657b515e1462b59498e462015f9264daa3badec2e0eda7a66db5ae9afaf2

  • C:\Users\Admin\AppData\Local\Temp\crvkmc.exe

    Filesize

    91KB

    MD5

    fa3f85e115ed69c2d518d5deaa790216

    SHA1

    ab409d96d10f11df4b1093df159eff0c29aba6cd

    SHA256

    5698598964222a80225a459bd1cc353d0c3d9ecc9689a547e4d180518c454c1e

    SHA512

    2cb74cf3f9a3527a081b1de470261c8b273f4357aa708bc446618aeddc55273bf2f1657b515e1462b59498e462015f9264daa3badec2e0eda7a66db5ae9afaf2

  • C:\Users\Admin\AppData\Local\Temp\crvkmc.exe

    Filesize

    91KB

    MD5

    fa3f85e115ed69c2d518d5deaa790216

    SHA1

    ab409d96d10f11df4b1093df159eff0c29aba6cd

    SHA256

    5698598964222a80225a459bd1cc353d0c3d9ecc9689a547e4d180518c454c1e

    SHA512

    2cb74cf3f9a3527a081b1de470261c8b273f4357aa708bc446618aeddc55273bf2f1657b515e1462b59498e462015f9264daa3badec2e0eda7a66db5ae9afaf2

  • C:\Users\Admin\AppData\Local\Temp\rkivp.h

    Filesize

    460KB

    MD5

    f6fd8bce9b4240f6a996fb136f9d53a9

    SHA1

    11b0aaf887de4db05a3d08f5de53abd2fa39f662

    SHA256

    a116d773246917fae18eec33f1accb7bfa1cfb94c91dad14517b0cee0b84e804

    SHA512

    980a810661119888a4d083b4daa197d619f787cba4d873e77b47bcf2bccdd197252f724237e760b689ed41dc9a984adc9c0fd8be15c96756795b419295146c0d

  • C:\Users\Admin\AppData\Local\Temp\zuelngxpgz.mts

    Filesize

    5KB

    MD5

    5f73297aa5e05f81b19023e058502420

    SHA1

    ddcb039e12921c8f5a3039c36bfa3d49a3d33ef5

    SHA256

    3aaa7dad63af6103a34dc4478e233de3e72e9dcb5a4a623ea4248f957bedabf0

    SHA512

    19784449b792fd2575639c48b3fa75e7b08bed44755a8701a4fca7465752d86706f5a866fc977c52c1f30c8229bd96603efcc7fc4ee9e04fbc3dcaf0b002d8c3

  • memory/1384-154-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1384-142-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1384-146-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1384-149-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3768-140-0x0000000002A80000-0x0000000002A82000-memory.dmp

    Filesize

    8KB

  • memory/4144-151-0x0000000005480000-0x000000000551C000-memory.dmp

    Filesize

    624KB

  • memory/4144-152-0x0000000005340000-0x0000000005350000-memory.dmp

    Filesize

    64KB

  • memory/4144-150-0x0000000000A30000-0x0000000000A96000-memory.dmp

    Filesize

    408KB